According to a recent study by the Better Business Bureau, it seems like troops are more likely than civilians to fall for predatory lending schemes and lemon car frauds. In other news, water is wet.
Okay. In all seriousness. I get it. These are serious scams that have been around since long before I was a young, dumb private. As long as there have been troops leaving their parent’s financial safety net and given a taste of real money with little recourse for wasteful spending (i.e. all-inclusive barracks and dining halls,) troops are always going to be troops. And from the bottom of my heart, these f*ckheads who realize this and prey on them regardless are the lowest form of scum.
But can we all stop acting like this is some new discovery? Either let’s educate the troops against these sh*tty spots just off post, have the BBB investigate these clowns to the fullest extent, or do something about it. We’ve all heard the jokes. Sitting around, agreeing that it’s f*cked up isn’t going to change anything.
Anyways, didn’t mean for that to go that serious. Here are some memes to get your weekend started.
Mock IEDs attacks, fire and maneuvering drills, and scrambled medical evacuations are just a few exercises Marines and sailors run while training at Mojave Viper. “The Viper” takes place in Twentynine Palms, California, the largest training base of the U.S. Marine Corps.
Although each scenario the Marines encounter is played out under strict supervision, it’s considered the closest thing to war a young infantryman are exposed to before facing the real enemy. The training takes place in a desert landscape that closely resembles the environment troops will meet in Afghanistan — and it sucks.
It’s f*cking filthy
Infantry Marines and sailors from various bases show up to Camp Wilson, where their desert training will take place. 99.9 percent of the time, the Marines occupy the K-spans located on the grounds. Those K-spans are rarely cleaned before the incoming troops arrive, which causes problems.
Plus, since you’re training in an open-desert landscape, the wind will blow all types of viruses and bacteria about. This, in conjunction with already-dirty living conditions, causes troops to come down with all kinds of illness, like pink-eye and a variety of sniffles. Keep your mouth closed and your eyes covered whenever possible.
Cpl. Dwight Jackson, a working dog handler with 1st Law Enforcement Battalion, I Marine Expeditionary Force, cools off his dog, Hugo while training in Twentypalms, Calif.
The summer heat
If you’re unlucky, you’ll be sent to Mojave Viper during the late spring and early summer months. You better start getting ready for the heat.
Not only is it freakin’ hot in the direct sunlight, but the blazing heat is made even worse by training in your full PPE gear. Welcome to hell!
Lance Cpl. Charles Wohlers, 1st LE Gunner, Marine Wing Support Squadron 371, prepares his gear for the cold wear before the Motorized Fire and Movement Exercise exercise on range 114, at Marine Corps Air Ground Combat Center, Twentynine Palms, Calif.
(Photo by Pfc. William Chockey)
The cold nights
If you think the days are bad, just wait until the sun goes down and the temperatures drop. Hell has just frozen over.
Lance Cpl. Daniel Breneiser, right, gets vaccinated against smallpox by Hospital Corpsman Nathan Stallfus
(Photo by MC1 Nathanael Miller)
Showering in a pool of smallpox
While stationed in the camp, most troops receive a smallpox vaccination on their upper arm. This vaccination creates a small blister which takes a few weeks to heal and may leave a scar. However, during that healing period, troops still have to shower to maintain proper hygiene.
As you shower, water will run over the blister and onto the floor. When multiple troops shower at the same time, the plumbing usually gets backed up, essentially creating a nasty pool of smallpox-laden backflow. Great.
Elon Musk is pushing SpaceX’s more than 7,000 employees to not waste any time after its first crewed space launch.
A little over a week ago, the rocket company successfully sent two astronauts to the International Space Station on an historic mission that may last nearly four months. But now the CEO is directing SpaceX to quickly switch gears, according to an internal email first obtained and reported by CNBC.
Musk told SpaceX employees to work full steam ahead on Starship, a reusable rocket designed to one day land on the moon for NASA and take up to 100 people at a time to Mars.
“Please consider the top SpaceX priority (apart from anything that could reduce Dragon return risk) to be Starship,” Musk wrote in the email, according to the report.
SpaceX did not immediately respond to Business Insider’s request for confirmation and comment on the email.
But Musk has said the company may need to build about 20 large prototypes before SpaceX can attempt to launch one into orbit.
To the moon, Mars, and beyond
In hopes of speeding up Starship’s progress, Musk’s email alluded to incentivizing employees from the company’s Los Angeles headquarters and Florida facility to “consider spending significant time” in Boca Chica, Texas, where Starship’s production complex is. (Business Insider previously reported the rocket company was hiring a project coordinator to help run a “SpaceX Village” with 100 rooms, lounge parties, volleyball tournaments, rock climbing, and more.)
Before a high-profile presentation about Starship from Boca Chica, Musk received pressure in September from NASA Administrator Jim Bridenstine. Bridenstine tweeted about his excitement for Starship but said it was “time to deliver” on sending astronauts to space using the older Crew Dragon and Falcon 9 system.
Now that Behnken and Hurley are in orbit, Musk appears intent on putting SpaceX’s full force into Starship. The system is in the running with NASA to land astronauts and supplies on the moon in the mid-2020s.
On Friday, Musk also confirmed that he still hoped to launch the first crew to Mars in a Starship vehicle in mid-2024 — ostensibly as the start of an effort to populate the red planet.
The Pentagon’s science and technology research arm is launching a vigorous push into a new level of advanced artificial intelligence, intended to integrate advanced levels of “machine learning,” introduce more “adaptive reasoning” and even help computers determine more subjective phenomena.
It is called the “AI-Next” effort, a Defense Advanced Research Projects Agency program to leverage rapid advances in AI to help train data to make computer analysis more reliable for human operators, agency Director Steven Walker recently told a small group of reporters.
DARPA scientists explain the fast-evolving AI-Next effort as improving the ability of AI-oriented technology to provide much more sophisticated “contextual explanatory models.”
While humans will still be needed in many instances, the 3rd Wave can be described as introducing a new ability to not only provide answers and interpretations, but also use “machine learning to reason in context and explain results,” DARPA Deputy Director Peter Highnam said.
In short, the AI-Next initiative, intended to evolve into a 3rd Wave, can explain the reason “why” it reached the conclusion it reached, something which offers a breakthrough level of computer-human interface, he added.
“When we talk about the 3rd wave, we are focused on contextual reasoning and adaptation. It requires less data training,” Highnam said.
This not only makes determinations more reliable but massively increases an ability to make more subjective interpretations by understanding how different words or data sets relate to one another.
A computer can only draw from information it has been fed or given, by and large. While it can add seemingly limitless amounts of data almost instantaneously, AI-driven analysis can face challenges if elements of the underlying stored data change for some reason. It is precisely this predicament which the 3rd Wave is intended to address.
“If the underlying data changes then your system was not trained against that,” Highnam explained.
For instance, 3rd wave adaptive reasoning will enable computer algorithms to discern the difference between the use of “principal” and “principle” based on an ability to analyze surrounding words and determine context.
This level of analysis naturally creates much higher levels of reliability and nuance as it can empower humans with a much deeper grasp of the detailed information they might seek.
“That is the future — building enough AI into the machines that they can actually communicate, share data and network at machine speed in real time,” Walker said.
Yet another example of emerging advanced levels of AI would be an ability to organize hours of drone collected video very quickly – and determine moments of relevance for human decision makers. This exponentially increases the speed of human decision making, a factor which could easily determine life or death in combat.
“In a warfighting scenario, humans have to trust it when the computer gives them an answer…through contextual reasoning,” Highnam said.
Given these emerging 3rd Wave advances, making more subjective decisions will increasingly be a realistic element of AI’s functional purview. For this reason and others, DARPA is working closely with the private sector to fortify collaboration with silicon valley and defense industry partners as a way to identify and apply the latest innovations.
DARPA’s 1st, 2nd & 3rd wave of AI
The third wave, described in DARPA materials as bringing “contextual explanatory models” and a much higher level of machine learning, is intended to build upon the 1st and 2nd Waves of DARPA’s previous AI progress.
The 1st Wave, according to available DARPA information, “enables reasoning over narrowly defined problems.” While it does bring certain elements of learning capability, it is described as having a “poor level of certainty.”
This points to the principle challenge of AI, namely fostering an ability to generate “trust” or reliability that the process through which it discovers new patterns, finds answers, and compares new data against volumes of historical data is accurate. Given this challenge, certain existing models of AI integration might have trouble adjusting to changing data or determining sufficient context.
The 2nd Wave enables “creating statistical models and training them on big data,” but has minimal reasoning, DARPA materials explain. This means algorithms are able to recognize new information and often place it in a broader context in relation to an existing database.
The 2nd Wave, therefore, can often determine meaning of previously unrecognized words and information by examining context and performing certain levels of interpretation. AI-enabled computer algorithms, during this phase, are able to accurately analyze words and information by placing them in context with surrounding data and concepts.
With this 2nd wave, however, DARPA scientist explain that there can be limitations regarding the reliability of interpretation and an ability to respond to new information in some instances; this can make its determinations less reliable. Highnam explained this as having less of an ability to train existing data when or if new information changes it. Therefore, this Wave is described by DARPA information as having “minimal reasoning.”
Can AI make subjective determinations?
Raytheon, for example, is currently exploring a collaborative research deal with the Navy to explore prognostics, conditioned-based maintenance and training algorithms to perform real-time analytics on otherwise complex problems. It is a 6-month Cooperative Research and Development Agreement (CRADA) to explore extensive new AI applications, company developers said.
Raytheon developers were naturally hesitant to specify any particular problems or platforms they are working on with the Navy, but did say they were looking at improved AI to further enable large warfigthing systems, weapons, and networks.
Todd Probert, Raytheon’s Vice President of Mission Support and Modernization, told Warrior Maven in an interview what their effort is working on initiatives which compliment DoD’s current AI push.
“Part of deploying AI is about gaining the confidence to trust the AI if operations change and then break it down even further,” Probert said. “We are training algorithms to do the work of humans.”
Interestingly, the kinds of advances enabled by a 3rd Wave bring the prospect of engineering AI-driven algorithms to interpret subjective nuances. For instance, things like certain philosophical concepts, emotions and psychological nuances influenced by past experience might seem to be the kind of thing computers would not be able to interpret.
While this is of course still true in many ways, as even the most advanced algorithms do not yet parallel human cognition, or emotion, in some respects, AI is increasingly able to make more subjective determinations, Probert said.
Probert explained that advanced AI is able to process certain kinds of intent, emotions, and biases through an ability to gather and organize information related to word selection, voice recognition, patterns of expression, and intonations as a way to discern more subjective phenomena.
Also, if a system has a large enough database, perhaps including prior expressions, writing or information related to new information — it can place new words, expressions and incoming data within a broader, more subjective context, Probert explained.
AI & counterterrorism – Torres AES
Other industry partners are using new levels of AI to fortify counterterrorism investigations and cyber forensics. For example, a US-based global security firm supporting DoD, the US State Dept. and friendly foreign governments, Torres Advanced Enterprise Solutions, employs advanced levels of AI to uncover otherwise obscured or hidden communications among terrorist groups, transnational criminals or other US adversaries.
While much of the details of this kind of AI application, company developers say, are naturally not available for security reasons, Torres cyber forensics experts did say advanced algorithms can find associations and “digital footprints” associated with bad actors or enemy activity using newer methods of AI.
As part of its cyber forensics training of US and US-allied counterterrorism forces, Torres prepares cyber warriors and investigators to leverage AI. Torres conducts cyber forensics training of US-allied Argentinian and Paraguayan counterrorism officials who, for instance, often look to crack down on terrorist financial activity in the more loosely-governed “tri-border” area connecting Paraguay, Argentina, and Brazil.
“The system that we train builds in AI, yet does not eliminate the human being. AI-enabled algorithms can identify direct and indirect digital relationships among bad actors,” said Jerry Torres, Torres AES CEO.
For instance, AI can use adaptive reasoning to discern relationships between locations, names, email addresses, or bank accounts used by bad actors.
To illustrate some of the effective uses of AI for these kinds of efforts, Torres pointed to a proprietary software called Maltego — used for open-source intelligence analysis and forensics.
“AI can be a great asset in which our defensive cyber systems learn about the attackers by increasing the knowledge base from each attack, and launching intelligent counter attacks to neutralize the attackers, or feign a counter attack to get the attacker to expose itself. AI is critical to countering attackers,” Torres added.
The software uses AI to find relationships across a variety of online entities to include social media, domains, groups, networks, and other areas of investigative relevance.
The growing impact of AI
AI has advanced quickly to unprecedented levels of autonomy and machine learning wherein algorithms are instantly able to assimilate and analyze new patterns and information, provide context, and compare it against vast volumes of data. Many now follow the seemingly countless applications of this throughout military networks, data systems, weapons, and large platforms.
Computer autonomy currently performs procedural functions, organizes information, and brings incredible processing speed designed to enable much faster decision-making and problems solving by humans performing command and control. While AI can proving seemingly infinite amounts of great relevance in short order — or almost instantaneously — human cognition is still required in many instances to integrate less “tangible” variables, solve dynamic problems or make more subjective determinations.
When it comes to current and emerging platforms, there is already much progress in the area of AI; the F-35s “sensor fusion” relies upon early iterations of AI, Navy Ford-Class carriers use greater levels of automation to perform on-board functions and Virginia-Class Block III attack submarines draw upon touch screen fly-by-wire technology to bring more autonomy to undersea navigation.
Other instances include the Army’s current experimentation with IBM’s AI-enabled Watson computer which, among other things, can be used to wirelessly perform real-time analytics on combat relevant maintenance details on Stryker vehicles. In a manner somewhat analogous to this, a firm called C3IOT uses AI-empowered real-time analytics to perform conditioned-based maintenance on Air Force F-16s.
“Despite higher levels of autonomy, in the end a human will make the decision, using computers as partners. We see the future as much less having machines do everything but rather humans and machines working together to fight the next battle,” Highnam explained.
This article originally appeared on Warrior Maven. Follow @warriormaven1 on Twitter.
The Air Force’s new F-35A multi-role, stealth Joint Strike Fighter brings an unprecedented ability to destroy targets in the air, attack moving enemies on the ground and beam battlefield images across the force in real time, an Air Force pilot told Scout Warrior in a special interview.
The stealth fighter makes it much easier for pilots to locate, track and destroy enemy targets across a wide range of combat circumstances — including attacks from farther ranges than existing fighters can operate, the F-35A pilot said.
Speaking to Scout Warrior as part of a special “Inside the Cockpit” feature on the F-35A, Air Force Col. Todd Canterbury, a former F-35 pilot and instructor, said the new fighter brings a wide range of new technologies including advanced sensors, radar, weapons for attack and next-generation computers.
Although he serves now as Chief, Operations Division of the F-35 Integration Office at the Pentagon, Canterbury previously trained F-35 pilots at Eglin Air Force Base, Fla. Canterbury is uniquely positioned to know the F-35’s margins of difference because he has spent thousands of hours flying legacy aircraft such as the service’s F-15 and F-16 fighters.
“The F-35 is a dream to fly. It is the easiest airplane to fly. I can now focus on employment and winning the battle at hand as opposed to looking at disparate information and trying to handle the airplane,” Canterbury told Scout Warrior.
Canterbury was referring to an often-discussed technological advance with the F-35 called “sensor fusion,” a system which places radar, targeting, navigation and altitude information on a single integrated screen for pilots to view. As a result, pilots can rely upon computer algorithms to see a “fused” picture of their battlespace and no longer need to look at different screens for targeting coordinates, air speed, mapping and terrain information, sensor feeds or incoming data from a radar warning receiver.
The F-35s Electro-Optical Targeting System, or EOTS, combines forward-looking infrared and infrared search and track sensor technology for pilots – allowing them to find and track targets before attacking with laser and GPS-guided precision weapons.
“I can turn my head and look left or right. There is an aiming cross on my helmet, an aiming symbology that tells me how to get there. The system will swivel over to the point on the ground I have designated,” Canterbury described.
The EOTs system is engineered to work in tandem with a technology called the Distributed Aperture System, or DAS, a collection of six cameras strategically mounted around the aircraft to give the pilot a 360-degree view.
“I can look through the airplane and see the ground below me. I can look directly below me without having to obscure my vision,” Canterbury said.
The DAS includes precision tracking, fire control capabilities and the ability to warn the pilot of an approaching threat or missile.
The F-35 is also engineered with an Active Electronically Scanned Array Radar which is able to track a host of electromagnetic signals, including returns from Synthetic Aperture Radar, or SAR. This paints a picture of the contours of the ground or surrounding terrain and, along with Ground Moving Target Indicator, or GMTI, locates something on-the-move on the ground and airborne objects or threats.
The F-35’s software packages are being developed in increments; the Marine Corps declared their Short-Take-off-and-Vertical-Landing F-35B with software increment or “drop” 2B.
Block 2B builds upon the enhanced simulated weapons, data link capabilities and early fused sensor integration of the earlier Block 2A software drop. Block 2B enables the JSF to provide basic close air support and fire an AMRAAM (Advanced Medium-Range Air to Air Missile), JDADM (Joint Direct Attack Munition) or GBU 12 (laser-guided aerial bomb), JSF program officials have said.
The next increment, Blocks 3i will increase the combat capability even further and Block 3F will bring a vastly increased ability to suppress enemy air defenses.
The Air Force plans to reach operational status with software Block 3i this year. Full operational capability will come with Block 3F, service officials said.
Block 3F will increase the weapons delivery capacity of the JSF as well, giving it the ability to drop a Small Diameter Bomb, 500-pound JDAM and AIM 9X short-range air-to-air missile, Air Force officials said.
Canterbury also talked about how Air Force engineers and experts were making progress building a computer library in the aircraft called the Mission Data Files.
“Experts are working feverishly to catalog all of the threats we might face,” he said.
Described as the brains of the airplane, the mission data files are extensive onboard data systems compiling information on geography, air space and potential threats in known areas of the world where the F-35 might be expected to perform combat operations, he explained.
Consisting of hardware and software, the mission data files are essentially a database of known threats and friendly aircraft in specific parts the world. The files are being worked on at reprogramming laboratory at Eglin Air Force Base, Fla., Air Force officials have said.
The mission data packages are loaded with a wide range of information to include commercial airliner information and specifics on Russian and Chinese fighter jets. For example, the mission data system would enable a pilot to quickly identify a Russian MiG-29 if it were detected by the F-35’s sensors.
The mission data files are being engineered to accommodate new threat and intelligence information as it emerges. For instance, the system might one day have all the details on a Chinese J-20 stealth fighter or Russian T-50 PAK FA stealth aircraft.
The first operational F-35A fighters have already been delivered to Hill Air Force Base in Utah, and Air Force leaders say the service has launched some small mini-deployments within the US to prepare the platform for deployment.
Apart from its individual technologies, weapons, sensors and systems, the F-35 is perhaps best appreciated for its multi-role capabilities, meaning it can perform a wide range of different missions from close-air support and air-to-ground attack to air-to-air engagements and intelligence, surveillance and reconnaissance, or ISR.
The aircraft’s sensor technologies allow the platform to perform a much greater ISR function than previous aircraft can, giving it a “drone-like” ability to gather and disseminate surveillance information. As part of this, the F-35 can also use a specially engineered data-link to communicate in real-time with other F-35s and other aircraft and fighter jets.
“With the datalink’s network interoperability, we can talk to each other and talk to fourth-generation aircraft as well,” Canterbury explained.
The F-35A can function as a reconnaissance aircraft, air-to-air fighter, air-to-ground fighter or stealth aircraft engineered to evade enemy air defenses, Canterbury explained.
“While stealth is important in the early phases of warfare to knock out integrated air defenses and allow fourth-generation fighters to fly in, we don’t need stealth all the time,” Canterbury said. “I can use my stealth and electronic attack to see an adversary well before he sees me.”
For instance, the F-35A is well-suited to loiter over an area and provide fire support to units on the ground in a close-in fight. In order to execute these kinds of missions, the F-35 will have a 25mm Gatling Gun mounted on top of the aircraft operational by 2017.
The F-35 has 11 weapons stations, which includes seven external weapons stations for bombs or fuel.
“If we don’t need stealth, I can load this up with weapons and be a bomb truck,” Canterbury explained.
Eventually, the Air Force plans to acquire more than 1,700 F-35As.
Seldom has there been a public servant who cares more about the people he represents than Robert Gates — and no one more bipartisan. The onetime U.S. Air Force officer has worked under eight administrations, held the post of Director of Central Intelligence, and, of course, was once the Secretary of Defense. The former Cold Warrior has a Ph.D. in Soviet History, but keeps a firm grasp on the nation’s security needs, even today.
And he has a solution for the government shutdown and the border security issue and is calling on both sides of Pennsylvania Avenue to “put the interests of the country above their power struggles and political mud wrestling.”
Defense Secretary Robert M. Gates reviews troops at the Armed Forces Farewell Tribute at the Pentagon, June 30, 2011.
(DoD photo by Petty Officer 1st Class Chad J. McNeeley)
In a recent Wall Street Journal opinion piece, elder statesman Gates chides both the Democratic members of Congress as well as President Trump and his Republican support for the impasse that has left thousands of federal employees into forced joblessness, or worse: forced, unpaid labor. He calls out both sides of government for the hypocrisy and the misinformation they spread trying to get their way.
All while reminding everyone who’s getting stuck in the middle of the fighting. It isn’t al-Qaeda, ISIS, or drug traffickers. He says, “all those involved share responsibility for the fiasco and its lamentable consequences for millions of Americans.”
But his solution isn’t to think smaller, he wants the United States to think big.
President George W. Bush, and Secretary of Defense nominee Robert Gates, right, look-on as Secretary of Defense Donald H. Rumsfeld addresses the nation during a news conference from the Oval Office, shortly after the President announced his replacement.
Gates sees the current deal offered by the Trump Administration to House Democrats — building his proposed .7 billion border wall in exchange for a reprieve on deportations for “dreamers” affected by the end of DACA — as too small. Instead, he believes the United States should look to President George W. Bush’s 2006 border security proposal for the solution.
Bush called for a mix of border security increases along with immigration reform measures, recognizing that deporting all 11 million illegal immigrants living in the U.S. at the time was not only too costly, but likely impossible. Bush’s reform measures would have made it possible for all illegals working in the country to be counted — and taxed. It also allowed them to stay where they live without the fear of deportation.
Gates with then-President George H.W. Bush
The Comprehensive Immigration Reform Bill of 2006 was a draft reform bill focused solely on the border areas, and had wide bipartisan support. Illegal immigrants in the U.S., for a certain number of years, could apply for citizenship after paying back taxes and fines. Others who have been in the U.S. not as long could stay, but would have to leave and apply for entry abroad. Most importantly, it shifted the focus to skilled workers from high-tech fields, allowing them special authorizations to stay longer.
In terms of border security, the bill added increased federal- and state-level funding for vastly more fencing, vehicle barriers, surveillance technology, and nearly double the personnel manning those measures. The Senate passed the bill easily, by a nonpartisan vote of 62-36, but the House of Representatives never voted on the measure, and the bill expired at the end of that year’s Congress.
April 27, 2018’s summit between North Korean leader Kim Jong Un and South Korean President Moon Jae-in was planned down to every last footstep.
The two countries even did a joint rehearsal of their two leaders meeting, shaking hands, and walking around the grounds of the Demilitarized Zone using stand-ins to make sure every second was calibrated as best as possible for the world’s cameras.
But for a moment, Kim went completely off script.
After shaking hands with Moon and stepping across the border line into South Korea, Kim invited Moon to step back into North Korea with him.
The South Korean president’s residence, The Blue House, confirmed the moment was “unscheduled.” According to a spokesman, Moon asked Kim, “When do I get to visit the North,” to which Kim replied “Why don’t you just come over to the North side now?”
The sudden invite didn’t appear to worry Moon, who was seen laughing and talking with Kim, before the two paused for a handshake on the North Korean side.
At another point, Kim appeared to go off script again joking about the famous cold noodles he had brought in from Pyongyang, which is “far.”
“I suppose I shouldn’t say ‘far’ now,” he seemed to quickly backtrack.
But the two moments, however light-hearted, will probably be taken very seriously by the US intelligence community.
Kim is an incredibly secretive leader — he even travels with his own toilet to prevent his health being analyzed through his excrements — which means intelligence officials rely on any and all clues to understand how he thinks and operates.
Intelligence officials told Reuters that experts will closely watch the inter-Korean summit and analyze what Kim says as well as his body language.
The current profile of Kim focuses on his tendencies for ruthlessness as well as rationality. But inviting Moon on a surprise visit to the North could also hint at a tendency for spontaneity.
This could pose a problem for the Trump administration’s strategy for meeting with Kim.
In the crucial months following the D-Day invasion, the clever foxes of the 23rd Headquarters Special Troops repeatedly fooled the Nazis by deploying a Ghost Army; a phantom division of mocked-up tanks, vehicles, and artillery. The artists, actors, designers, and audio-technicians who made up the unit managed to deceive the Nazis on more than 20 occasions.
Now, more than seventy years later, a bipartisan congressional movement seeks to reward the tricksters for their efforts. Rep. Peter King (R-N.Y.) and Rep. Annie Kuster (D-N.H.) have introduced a bill called “The Ghost Army Gold Medal Act,” according to the Washington Times. “It is finally time that the American people recognize their ingenuity and selflessness which saved countless American and Allied lives,” Mr. King says. “The Ghost Army deserve their due.”
The bill has picked up over 30 co-sponsors in the House, with a companion bill being introduced in the Senate. There are currently surviving “Ghost vets” in 11 states and the District of Columbia. If the Ghost Army is awarded the Congressional Gold Medal, they will be joining other specialized WWII units such as the Monuments Men, the Doolittle Raiders, and the Native American Code-talkers.
Though the 23rd was made up of only 1,000 men, they were often able to dupe the Nazi army into believing they numbered closer to 30,000. They did this by strategically placing dummy tanks, trucks, and artillery within enemy line of site, while blasting sound effects of heavily armed infantry on giant boom boxes, while could be heard from more than 20km away. This was often enough to distract the enemy long enough for the non-inflatable Allied Army to get into position on the crucial front lines of Normandy to the Rhine River. It’s estimated that these tactics saved tens of thousands of soldiers’ lives.
The ingenuity of the 23rd wasn’t limited to battlefield theatrics. Actors within the Ghost Army impersonated U.S. general and hi-ranking officers in European towns, brazenly discussing fake military plans over casks of wine and fooling German spies. Architects and set designers even constructed dummy camps and airfields, complete with tents and laundry drying on clotheslines, and fake convoys of empty trucks ferrying back and forth.
Hollywood has taken notice, as well, and a “Ghost Army” film is currently being developed by “American Sniper” actor Bradley Cooper and producer Todd Philips.
A decade ago, he was a young Army soldier training Iraqi troops when he noticed their primitive filing system: handwritten notes threaded with different colors of yarn, stacked in piles. For organization’s sake, he built them a simple computer database.
Now an Army reservist, the major is taking a break from his civilian high-tech job to help America’s technological fight against Islamic State extremists, part of a growing force of cyberexperts the Pentagon has assembled to defeat the group.
“The ability to participate in some way in a real mission, that is actually something that’s rare, that you can’t find in private sector,” said the 38-year-old Nebraska native who is working at U.S. Cyber Command at Fort Meade, Maryland.
“You’re part of a larger team putting your skills to use, not just optimizing clicks for a digital ad, but optimizing the ability to counter ISIS or contribute to the security of our nation.”
Last year, then-Defense Secretary Ash Carter expressed frustration that the United States was losing the cyberwar against Islamic States militants. He pushed the Cyber Command to be more aggressive.
In response, the Pentagon launched an effort to incorporate cyber technology into its daily military fight, including new ways to disrupt the enemy’s communications, recruiting, fundraising, and propaganda.
To speak with someone at the front lines of the cyber campaign, The Associated Press agreed to withhold the major’s name. The military says he could be threatened or targeted by the militants if he is identified publicly. The major and other officials wouldn’t provide precise details on the highly classified work he is doing.
But Lt. Gen. Paul Nakasone, commander of U.S. Army Cyber Command, said the major is bringing new expertise for identifying enemy networks, pinpointing system administrators or developers, and potentially monitoring how the Islamic State’s online traffic moves.
He “has the ability to bring an analytic focus of what the threat is doing, coupled with a really deep understanding of how networks run,” Nakasone said, describing such contributions as “really helpful for us.” He outlined a key question for the military: “How do you impact an adversary that’s using cyberspace against us?”
The military services are looking for new ways to bring in more civilians with high-tech skills who can help against IS, and prepare for the new range of technological threats the nation will face.
Nakasone said that means getting Guard and Reserve members with technical expertise in digital forensics, math crypto-analysis and writing computer code. The challenge is how to find them.
“I would like to say it’s this great database that we have, that we’ve been able to plug in and say, ‘Show me the best tool developers and analysts that you have out there,'” Nakasone said. “We don’t have that yet. We are going to have one, though, by June.”
The Army Reserve is starting a pilot program cataloging soldiers’ talents. Among 190,000 Army reservists, Nakasone said there might be up to 15,000 with some type of cyber-related skills. But there are legal and privacy hurdles, and any database hinges on reservists voluntarily and accurately providing information on their capabilities.
Normally, Nakasone said a reservist’s record includes background, training, assignments, and schools attended.
“I would like to know every single person that has been trained as a certified ethical hacker,” he said.
Nakasone said officials were still working out costs.
“The money will come,” he said, because building a ready cyber force is necessary.
The Army major said others in the civilian high-tech industry are interested in helping.
Many would like to participate “in something bigger than themselves, something that has intrinsic value for the nation,” he said.
The major said he has signed up for a second one-year tour in his cyber job. He is looking at options for staying longer.
“I find what I’m doing very satisfying, because I have an opportunity to implement things, to get things done and see them work and see tangible results,” he said. “I’m not making as much as I was on the civilian side. But the satisfaction is that strong, and is that valuable, that it’s worth it.”
For many people, their 30s are the period of their lives where the biggest changes take place, like moving across the country, changing career paths, or settling down.
It’s also the decade when many people move ahead professionally. There are plenty of incredibly successful people who got their big career breaks in their 30s. Megyn Kelly, for example, left a nine-year legal career at age 33 to work in media, while Oprah Winfrey didn’t become a national icon until her show became syndicated when she was 32.
Read on to learn about nine successful people who made their careers in their 30s.
1. Jeff Bezos was enjoying a successful career as a Wall Street executive when he launched Amazon at the age of 31. The online retailer has made Bezos the richest man in the world — he has a net worth of more than $130 billion.
4. Reid Hoffman was 35 when he founded LinkedIn. Before that, he was executive vice president of PayPal, another role he took in his 30s. Today, Hoffman’s net worth is estimated at more than $3 billion.
9. With $3 billion in net worth, Oprah Winfrey is among the richest self-made women in America. Winfrey began working in media in her early 20s, but didn’t get her career break until she was 32, when her talk show became nationally syndicated.
Got an hour or 24? Starting a new show, especially a really good one, can be as exciting as riding a roller coaster, boasts a much lower risk of exposure to COVID-19 and provides days of entertainment rather than minutes.
Dive into these series about the military and government to keep quarantine interesting. While our recommendations include both the classic and the cutting edge, they’ll all keep you entertained and might even teach you something in the process.
Where to watch: Hulu Rating: TV-PG
Ah, the classic. M*A*S*H is one of the most popular television series of the past 30 years, depicting life in a hospital base during the Korean War. Running from its first airing in 1972 to 1983, the series proved to be a quintessential series of the 70s. It’s a sitcom, but an abnormal one; each episode has a completely different tone and discusses a diverse range of topics.
That’s part of what makes M*A*S*H so great — it’s an excellent show to watch with family and everyone is guaranteed plenty of laughs while watching, but it also delves into heavier scenarios. Its flexibility is unmatched in film today. M*A*S*H boasts well-known actors such as Alan Alda, Loretta Swit, David Odgen Stiers and Gary Burghoff and has won several Emmy awards. If you haven’t already enjoyed M*A*S*H, seasons one through 11 are available for viewing on Hulu.
2: Madam Secretary
Where to watch: Netflix Rating: TV-PG
Heartwarming yet surprisingly suspenseful, Madam Secretary made me proud to live under the U.S. government. The family drama depicts fictional Elizabeth McCord, U.S. Secretary of State, as she navigates realistic diplomatic issues in the White House. The series also showcases her homelife as she balances being a working mom and life with her husband Henry McCord, a CIA operative and ethics professor. Tea Leoni plays the lead role of Elizabeth McCord and produced the series as well. The greatest appeal of Madam Secretary is its versatility – it’s easy to watch with family due to its subplot regarding Elizabeth’s home life, and gripping enough to binge by yourself, too. It sounds hard to believe, but take it from someone with an attention span shorter than the average TikTok – you’ll be invested in Elizabeth’s diplomatic dilemmas. Seasons one through 6 are available on Netflix, and additional episodes are on HBO.
3: West Wing
Where to watch: Netflix Rating: TV-14
West Wing depicts the political excursions of the White House staff and cabinet members of fictional president Josiah ‘Jed’ Bartlet. This series is similar to Madam Secretary, but can be seen as more of a “political epic.” As the series continues and each member of the staff’s personality is portrayed, the show’s superb writing and thorough characterization shine. Actors Martin Sheen, Rob Lowe and Allison Janney star in the show, and the series boasts 27 Emmy awards. Additionally, TV Guide ranked it the “#7 TV drama of all time.” While President Bartlet is a democrat, the show stands out for its depiction of modern issues from an apolitical perspective, highlighting the nuance behind bipartisan decision making. Not to mention, incredible acting for well-written characters.
4: TURN: Washington’s Spies
Where to watch: Netflix Rating: TV-14
This one’s a bit more historical. Set in 1778, Washington’s Spies depicts a seemingly ordinary farmer who spies on British Loyalists and soldiers for the blooming American government. This one will appeal to anyone who’s been into Hamilton, which – be honest – is probably more of us than we’d like to admit. It’s got all the good military action combined with the appealing, tried-and-true trope of an undercover spy, topped off with rich history. Parents will enjoy the espionage and historical subplots, while kids will enjoy the rich action. A crowd pleaser all around. Seasons one through four are available on Netflix.
Where to watch: HBO Rating: TV-MA
Veep, considering the profanity, probably isn’t a series to watch with younger audiences, but its satirical take on politics brings a hilarity unlike anything I’ve ever seen. The series depicts the career and personal life of Selina Meyer, the newly elected Vice President of the United States, and her dysfunctional relationship with the president and her staff. Veep is refreshing because political roles – even high up ones – aren’t glorified, as they are in so many other series. Julia Louis-Dreyfus plays Selina and the show runs for 65 episodes on HBO.
Where to watch: Hulu, Showtime Rating: TV-MA
Homeland, while portraying American intelligence in a gripping way, is leagues above other shows listed because of its plot. It’s exciting above all else, and stays interesting and fresh as it follows main character Carrie Mathison. Carrie’s inner demons provide conflicts just as tangible as terrorism threats, and while the seasons build up to climactic, explosive endings, Carrie’s character pulls the show eight seasons. Available on Hulu and Showtime, Homeland stars Claire Danes as Carrie as well as Mandy Patinkin, Rupert Friend, and Maury Sterling.
7: Jack Ryan
Where to watch: Amazon Prime Video Rating: TV-MA
Those who fell in love with John Krasinski in The Office will be especially attracted to Jack Ryan – and I don’t just mean the grade school kids who obsess over Jim and Pam. Those of us who have seen Krasinski act in and produce other media know he’s capable of amazing character evolution and series production, and Jack Ryan is no exception. In fact, this show very well may be the best example of his abilities. Season one follows Ryan as he tracks bank activity from Suleiman, an Islamic extremist, and is faced with more action than he ever faced in his intelligence work. Originally released on Amazon Prime in 2018, Jack Ryan quickly became very popular and was later nominated for several Emmy awards. Season two depicts Ryan entangled in Venezuela corruption and political unrest. Jack Ryan should be a go-to when looking for a short action series that’s as eventful as our imagined roller coaster.
8: Band of Brothers
Where to watch: HBO Rating: TV-MA
The 2001 miniseries Band of Brothers reminds me of a mini pack of MM’s. Following “Easy Company,” a battalion during World War II, Band of Brothers dedicates one episode to each central member. The miniseries is historically accurate, and each episode depicts the actual experience of each member, with the narratives engaging enough to compel the viewer to keep watching more. It’s the classic “one more episode!” approach to every show worth binge watching, and realistically, have you ever only eaten a half of a pack of MMs? From the pilot episode, you want to keep going; the tantalizing string of episodes makes up for what it lacks in length by stellar acting, screenwriting and a hell of a plot. Actors include David Frankel, Mikael Salomon, Tom Hanks and David Leland. It’s produced by Steven Speilberg and Tom Hanks and won seven Emmy awards.
9: The Spy
Where to watch: Netflix Rating: TV-MA
Ah, another historically accurate miniseries! The Spy portrays the mission of spy Eli Cohen during the often-overlooked six day war between Israel and Syria. Taking place in 1967, the miniseries follows the aforementioned Eli Cohen as he spies on the Syrian government for the Israeli Intelligence Agency (Mossad). Cohen establishes himself among Syria’s elite, and is promoted in the Syrian military. The series is only six episodes, and therefore is a quick watch. Similar to Band of Brothers, The Spy leaves you wanting more after each episode. It’s available on Netflix.
10: The Blacklist
Where to watch: Netflix Rating: TV-14
The Blacklist depicts the endeavors of ex-crime boss Red Reddington and his requested FBI forensic psychologist partner, Elizabeth Keen, as the duo take down crime lords that Reddington used to work with. Each episode depicts the pursuit of a criminal so cunning and covert they aren’t even known to authorities. Reddington’s assistance in the mission. The Blacklist stands out for its refreshing take on a classic crime trope, and keeps the viewer interested with the clues into the nature of the personal lives of Reddington and Keen. Spanning seven seasons, The Blacklist is easy to binge watch or to fall back onto when tired of other shows. It stars James Spader and Megan Boone and won the Primetime Creative Arts Emmy in 2014.
The Department of the Air Force awarded a nearly $1.2 billion contract for its first lot of eight F-15EX fighter aircraft, July 13, 2020. (U.S. Air Force)
The U.S. Air Force has awarded a contract to acquire its first fourth-plus-generation F-15EX fighter aircraft from Boeing Co.
The service said Monday that the nearly $1.2 billion contract will cover eight jets, including initial design, development, test and certification, plus spare parts and support equipment, training and technical data, and delivery and sustainment costs.
“The F-15EX is the most affordable and immediate way to refresh the capacity and update the capabilities provided by our aging F-15C/D fleets,” Gen. Mike Holmes, head of Air Combat Command, said in a release. “The F-15EX is ready to fight as soon as it comes off the line.”
In January, officials posted a presolicitation notice with the intent of awarding two sole-source contracts, one for the F-15EX and the other for its F110 engines. The move initiated the Air Force’s first fourth-generation fighter program in more than 20 years.
According to Boeing, the F-15EX will be able to “launch hypersonic weapons up to 22 feet long and weighing up to 7,000 pounds.” The company has said the fighter will be equipped with better avionics and radars and could carry more than two dozen air-to-air missiles.
“The F-15EX is the most advanced version of the F-15 ever built, due in large part to its digital backbone,” said Lori Schneider, Boeing’s F-15EX program manager. “Its unmatched range, price and best-in-class payload capacity make the F-15EX an attractive choice for the U.S. Air Force.”
The service said the aircraft’s most significant upgrade will be its open mission systems architecture, allowing the plane’s software to be upgraded and installed more easily compared to its aging F-15C/D cousin, which the service has been on a quest to replace.
“One of the considerations was the diversity of the industrial base,” a senior defense official said at the Pentagon on March 22, 2019. “Maintaining a diverse industrial base is in the best interest of the Department of Defense. The more diversity, the more competition … and the better prices we have.”
The Air Force plans to purchase a total of 76 F-15EX aircraft over the five-year Future Years Defense Program, known as the FYDP, officials said Monday. It intends to build an inventory of at least 144 aircraft over the next decade.
The first eight F-15EX aircraft will be based at Eglin Air Force Base, Florida, for the testing wing at the base. The first two aircraft are expected to be delivered in fiscal 2021, and the remaining six in fiscal 2023, the release states.
“When delivered, we expect bases currently operating the F-15 to transition to the new EX platform in a matter of months versus years,” Holmes said.
As Pyongyang continues to erode mountains with weapon tests and exchange fiery rhetoric with President Trump, the U.S. Army has been hard at work prepping for the possibility of open conflict by creating a strategic megabase.
3,500 acres of space, housing for 36,000 inhabitants, and $11 billion worth of recent renovations: Welcome to Camp Humphreys. In addition to an airstrip, communication facilities, and barracks, the base, about 40 miles south of Seoul, houses shops, schools, churches — and even a golf course.
Nice amenities aside, you might be wondering why, with an existing 174 bases in South Korea, the U.S. Army needed such a powerhouse. The answer is two-fold:
1. Consolidating Forces
Camp Humphreys is located just a few miles both from Osan Air Base and Pyeongtaek harbor. Whether forces and assets are coming in via air or sea, they’re just a short jaunt from this megabase, making it an ideal waystation for troops funneling into the peninsula and moving toward the front.
Expanding Camp Humphreys is also a way for the US to consolidate forces in the country. Just a little over a decade ago, forces were spread across over 170 bases in South Korea. With a bolstered Camp Humphreys, the U.S. is on track to reach their goal of dividing forces among under 100 bases by 2020. Plus, if conflict does open up, the U.S. will have a single, central meeting place for quick communications and decision-making.
2. Moving the Battlefield
Previously, the U.S. Army garrison at Yongsan in Seoul was seeing heavy use. While it’s good to maintain a force in South Korea’s capital, it’s probably not a good idea to keep your primary base within range of Northern artillery lined up along the border.
Additionally, the North has threatened (as they love to do) to attack key military installations — going as far as to honor Camp Humphreys with the distinction of target #1. Moving the North’s bullseye south, away from civilian-dense Seoul, just makes good sense for the unlikely event that Kim Jong-un makes good on a threat.
Although it’s out of artillery range, as a prime strategic target, Camp Humphreys needs to be protected from North Korean ballistics. To this end, the base is protected by Patriot Air-Defense missiles installed at Osan Air Base and THAAD missiles further to the south.
Of course, the best outcome in Korea doesn’t involve open conflict. However, nobody prepares for the best and an expanded Camp Humphreys has been ramped up to deal with the worst if it comes.